On-device content filtering for the enterprise

Month: July 2023

Author: July 26, 2023 by Haddayr Copley-Woods

Source: https://www.jamf.com/blog/on-device-content-filtering/

What is on-device content filtering?

On-device content filtering is a network filtering framework provided by Apple that allows us to protect organizations by enforcing web protection directly on the device. This allows organizations to enforce a more comprehensive policy and ensure greater privacy for the end user.

Network filtering can bolster your organization’s security.

Why do companies need on-device content filtering?

Identity and access management, endpoint protection and threat protection and remediation are excellent security measures for companies to take. The additional measure of content-filtering software adds another layer of protection against the top threat to company data today: social engineering. Specifically, phishing.

It’s vital for organizations to invest in security awareness training programs, but backing up that training with phishing protection protects sensitive company data even more thoroughly.

Content filtering can protect companies and users against:

  • Unintentional sharing of credentials at a site designed to imitate company websites
  • Intentional or unintentional web filter bypass when bypassing internet filtering by visiting a site via its IP addresses
  • Accidental visits to sites that prompt users to download malware

How does Jamf’s on-device content filtering work?

On-device content filtering is a part of Jamf Protect, and it’s configured in Jamf Security Cloud. There are a number of means to filter content on an individual device. Here are a few that Jamf uses, often leveraging already-existing Apple technology and services.

Sandboxes

Before anything can even get close to your organization’s cloud data, Jamf inspects traffic on an individual iPhone in a restrictive sandbox. Before traffic leaves the sandbox, Jamf strips sensitive data, such as URL query parameters. Because the inspection happens on the device, unsafe data traffic never even gets close to your organization’s network.

Apple’s NEFilterProvider

NEFilterProvider is a semi-sandboxed architecture that works like this: two network extensions (one heavily sandboxed, and one less so) work in close cooperation to allow advanced filtering of content while preserving privacy.

Encrypted DoH

Apple supports encrypted DNS (DoH and DoT) in iOS 14 and macOS 11 and above for web threat prevention and domain filtering. Jamf’s on-device content filtering filters web content and IP address data, as well as per-site byte counting and data capping.

What are the benefits of on-device content filtering?

On-device content filtering inspects traffic at the socket level. It’s a more comprehensive filter than a cloud proxy with a secure DNS.

With this type of content filtering, organizations can:

  • Evaluate domain names, full URLs, IP addresses, ports, protocols and more
  • Identify the app that is the source of the unsafe traffic and act upon it
  • Impact network performance only minimally; a lack of reliance on proxy servers or DNS resolvers means that latency is kept at a minimum

On-device content filtering provides:

  • Increased phishing protection
  • Web threat prevention
  • Web content filtering and data capping

What do I need to use Jamf’s on-device content filtering?

Jamf’s on-device content filtering is a part of Jamf Protect and is configured in Jamf Security Cloud. It’s currently available on supervised iOS and iPadOS 16+ devices with the Jamf Trust app installed. IT can create Smart Groups based on OS version and management state to take advantage of on-device content filtering on managed devices if your organization supports a mix of supervised and unsupervised devices.

Jamf is planning macOS support for on-device content filtering later this year.

Request a free trial of Jamf Protect and Jamf Trust today.


Is compliance keeping you awake?

Month: July 2023

Author: July 25, 2023 by Eden Amitai

Source: https://www.jamf.com/blog/managed-security-compliance-done-better/

Compliance management: Why you’re awake

Compliance is all about juggling different concerns across multiple levels and not letting the stress win. While it may seem like an exercise in futility, there are certainly better ways to manage each aspect than simply going it alone.

But before we get ahead of ourselves, let’s take a moment to consider the current landscape and factors that impact compliance.

Modern threat landscape

Cybersecurity and compliance require dealing with a lot of moving parts to achieve the balance that’s right for your company. When speaking of both, we’re specifically referring to risk and the significant role it plays in weakening security, in turn, causing endpoints to become out of compliance.

Take for example ransomware, also known as the “fastest growing type of cybercrime,” according to Cybercrime Magazine. While current estimates place the median cost of a ransomware attack at $10 million, it should come as no surprise that the global cost of ransomware hovered at $20 billion as of 2021. And if that weren’t bad enough, it is expected to swell to $265 billion by 2031, according to security experts, KnowBe4.

What’s causing this, you ask? It’s a perfect storm of:

  • the human element that was responsible for 74% of attacks
  • difficulty of law enforcement to prosecute crimes at a global level
  • victims’ willingness to pay ransom to salvage impacted businesses

While ransomware threats only make up a part of the overall risk impacting organizations, its growth is a clear signal that there’s money to be made, and bad actors are cashing in by exploiting risk factors. But costs stemming directly from threats are just a part of the financial equation, indirect costs, such as those relating to fighting off attacks or remedial costs resulting from leaks of protected data, like student or health records add to the overall economic impact.

Of course, then there’s the impact on an affected company’s reputation as it relates to a data breach. All told these compounding factors result in publicly traded companies suffering “an average decline of 7.5% in their stock values, coupled with a mean market cap loss of $5.4 billion.” In short: a ripple effect is not uncommon after each data breach, which reverberates throughout the entire supply chain, coupled with an average delay of 46 days, which means impacted organizations can stand to lose billions of dollars in lost market cap and increased operational costs before their stock prices can recover to pre-breach levels — if they are able to do so at all.

Additional challenges facing IT compliance management right now are:

  • Limited resources and manpower to effectively manage and maintain compliance requirements
  • An increasingly complicated technology stack
  • Poor communication across stakeholders and leadership
  • Cost constraints at a time when more budget is needed to achieve compliance
  • Manual, time-consuming processes that put even more pressure on resources and manpower
  • Limited visibility into your security and compliance posture
  • Inefficient evidence collection, like screenshot-based evidence and stakeholder dependency

Many of the challenges facing the compliance landscape today are interconnected within an ecosystem of risk, such as: cyber security threats, user-introduced concerns, like Shadow IT, device and resource management, distributed workforces, cloud-based software, regulatory oversight and constant monitoring and visibility into endpoint health.

Key findings

The State of Security compliance report, a report released annually by anecdotes that conducts a broad study of statistics and insights collected from compliance leaders across tech companies of all stages of maturity and growth found that “88% of compliance leaders must overcome significant obstacles when implementing and growing their security compliance programs.

Additionally, anecdotes research found these other challenges:

  • 50% of compliance teams cite a lack of automation as a reason for delays in the audit process.
  • 47% of leaders agree that a lack of manpower is among the greatest challenges that keep them up at night.
  • 29% of compliance leaders cite a lack of budget as a main challenge instead of as a business enabler.
  • 25% of respondents say that their leadership continues to view compliance as a burden and does not view the adoption of frameworks as a technical necessity.

What can take the edge off of managing compliance? Automation, of course

Data-powered automation simplifies compliance procedures and processes by leveraging technology to minimize complexity. Relying on automated functionality not only replaces manual and repetitive tasks but doing so also streamlines them while greatly reducing the likelihood of the occurrence of error-prone processes. The result? Achieving standardized compliance within your data-driven ecosystem serves to strengthen your posture while leveraging technology and tooling to perform the heavy lifting.

It’s resting your weary compliance head down on the soft pillow of automation and data that provide you with true visibility into your posture to identify gaps. So, bid a not-so-fond farewell to nagging, chasing, managing, checking, asking, and driving the compliance agenda across the organization and multiple stakeholders.

What are some of the other benefits of automating your compliance program help?

  • Save your organization time by streamlining the tedious, time-consuming and manual process of gathering evidence
  • Maximize productivity by efficiently making the best use of resources and stakeholders
  • Gain deep visibility and share that insight through robust collaboration tools
  • Improve the ease with which credible data is gathered and accepted by world-leading audit firms

anecdotes works to simplify your compliance management system

Despite the challenges cited above, managing compliance requirements at the enterprise level doesn’t have to be so stressful.

Enter Compliance OS by anecdotes.

With capabilities that provide more than mere PDFs, templates or test results — leveraging anecdotes “provides data-powered automation that takes your compliance to the next level.” We believe credible, visible and actionable data should be the foundation of every compliance initiative.

How does anecdotes help you manage your compliance goals?

By implementing the anecdotes Compliance OS within your organization, teams are supercharged and silos are broken down to not just save you time and resources but drive collaboration and communication.

We’re talking about data that works for you, not the other way around.

The ultimate goal? To give your organization complete control and visibility over the many data points that will drive your security compliance program to success. Some of the ways anecdotes works for you to deliver real, continuous compliance are:

  • It connects directly to your tech stack and performs all the evidence collection concisely and automatically across different platforms and multiple stakeholders.
  • By ensuring robust compliance management with mandated compliance frameworks that take advantage of the intelligent cross-mapping capabilities to help you grow your program, without growing your workload.
  • Utilizing a feature-rich toolset to collaborate with different stakeholders while centralized communications ensure that even the smallest of compliance details don’t fall through the cracks.
  • Contextualizing data sets that are not just easy and intuitive, but ecosystem-vetted structured data that is ready to use, serving as the basis for current and future compliance requirements.

anecdotes + Jamf

Two great solutions that, when combining anecdotes and Jamf, compliance and mobile device management (MDM) optimize security through automation and device security. Security teams can guarantee the safety of their devices and data, mitigate risks, and minimize the chances of breaches while compliance leaders ensure that compliance is maintained every step of the way — both working together to reduce risk that may otherwise harm your company’s reputation.

By integrating the anecdotes Compliance OS and Jamf Pro, the former automatically collects data that serves as evidence critical to your compliance status directly and securely from the latter. It then maps the data gathered to relevant controls within the anecdotes compliance OS. This level of data-powered compliance realizes live data, advanced automation and other applications integrated securely to gain comprehensive visibility into your compliance posture.

Armed with deep insight into your current compliance posture, Compliance OS aids organizations by converting manual, time-consuming and siloed tasks into an automated, continuous and strategic compliance journey, while Jamf delivers a comprehensive management system for Apple macOS and iOS-based.

In short: anecdotes + Jamf deliver managed security compliance for every device through an advanced, automated ecosystem that transforms your compliance program from what currently it isto exactly where it needs to be.

Streamline your compliance program!

Visit the Jamf Marketplace to integrate anecdote today.


Protect company data and user privacy with iOS containerization.

Month: July 2023

Author: July 24, 2023 by Haddayr Copley-Woods

Source: https://www.jamf.com/blog/breaking-down-the-apple-approach-to-containerization/

What is containerization?

Containerization, in its general sense, is the ability to keep certain types of apps and data completely separate from others on a device used for work. Apps and data managed by an organization are kept partitioned from apps and data that belong to an individual employee.

What is the purpose of containerization?

Containerization keeps company and individual data separate on devices used for work and for personal use. This allows companies to control access to their own apps and data without also managing an employee’s data and apps for personal use.

How does Apple containerize?

Apple, combined with an MDM such as Jamf Pro, puts device data and apps into separate volumes on iOS and iPad: managed and unmanaged. This allows companies to manage their own data and apps while leaving employee contacts, location and personal apps untouched.

With MDM containerization and Apple’s volumes, there is an unbreakable separation between the two types of apps and data. It is not possible, for instance, for a user to copy and paste between these two sides.

How does iOS containerization affect the user experience?

Thanks to Apple’s focus on the user experience, employees can take advantage of this feature without having to sign in and out of each side or manually switch between work and personal interfaces. With containerized apps, although work and personal data are completely isolated from one another, employees use their devices just as they always have.

Because Apple already has separate volume capabilities as part of its operating system, no outside client is required. Just Apple and an MDM.

If you’d like more detail on how Apple helps to manage corporate data and employee-owned devices, read Apple’s paper “Managing Devices and Corporate Data.”

What are the advantages of containerization?

Containerization protects both organizations and individual employees.

Containerization advantages for business

  • When organizations are able to manage access to their networks, data and apps, they sharply mitigate risk while also enabling their employees to work from anywhere and on their preferred devices.
  • With Jamf Pro, organizations have complete control of company apps and data, along with the ability to further restrict access to sensitive data based on Smart Groups and configuration profiles.
  • Organizations can also ensure that devices and individuals are trusted and verified before entering the network without controlling an employee’s personal use.

Containerization advantages for employees

Containerization means that employers are able to manage only the work-related portion of an employee’s device.

  • Workers can enjoy the convenience of one device for work and personal use without worrying about an employer tracking or spying on them.
  • With containerization using separate Apple volumes, even if a company wished to access an employee’s location, read their texts, or discover which personal apps they are using, they would be unable to do so.
  • And staff doesn’t have to worry about accidentally sending sensitive information outside of the organization, or sending personal information to business associates.

Why containerization is important in BYOD

Containerization is more than just important in BYOD. It’s absolutely essential.

Many companies like the idea of allowing individuals to use their own devices. Employees who participate in BYOD programs at work not only shoulder the cost of devices, but they also experience a boost in productivity, by and large.

However, companies must take care to protect their networks and sensitive data on all devices— not just company-owned. And they must do so while also assuring employees that they will not attempt to surveil them or track their locations.

For employee buy-in, organizations must be able to convince them that they are enabling work, not spying on them. Containerization is how they can do exactly that.

And for organizations to trust in their BYOD programs, containerization allows for all of the security and access controls that a company needs while also protecting employee privacy.

Jamf can help you take advantage of containerization in your BYOD program.


What is Zero Trust Network Access (ZTNA)?

Month: July 2023

Author: July 21, 2023 by Hannah Hamilton

Source: https://www.jamf.com/blog/what-is-zero-trust-network-access/

You might have heard about the increasingly popular ZTNA, or Zero Trust Network Access, as a replacement for VPN. But what is ZTNA, how does it work and what are its benefits? Let’s get into it.

What is Zero Trust?

But first, let’s talk about the first half of “ZTNA” — Zero Trust. NIST defines Zero Trust as

a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised.

In other words, never trust — always verify. Assume your network has already been breached so every access request needs to be scrutinized and verified to confirm the right person is accessing your resources. Zero Trust Architecture (ZTA) takes this principle further and builds a cybersecurity plan around it, adopting strict access policies and workflows. ZTA is built with these concepts in mind:

  • “Resources” are all data sources and services, including but not limited to SaaS platforms, storage devices, corporate owned devices and BYOD devices with access to company resources.
  • All communication must be secured regardless of network location, including outside the organization’s perimeter.
  • Access to resources is granted on a per-session basis.
  • Access to resources is determined by dynamic policy that checks attributes like the user account, application or service, device characteristics and/or behavioral attributes.
  • The organization monitors and measures the integrity and security posture of all owned and associated assets, evaluating this when evaluating a resource request and denying access to devices that do not meet requirements.
  • Access is only granted once authentication and authorization to a resource is strictly verified, every time access is requested.
  • Contextual information about the current state of assets, network traffic and access requests is collected to improve the organization’s security posture.

Organizations use Zero Trust best practices because implicit trust just isn’t cutting it anymore. VPNs have been used for decades, but one successful login to a VPN gives the user access to your network as a whole, allowing for bad actors to move laterally until they get what they want. The upsurge of remote work eliminated the network perimeter as users are connecting to company resources from who-knows-where on who-knows-what-network. This means companies need a stricter access policy — enter ZTNA.

How does Zero Trust Network Access work?

ZTNA relies on two main concepts: microsegmentation and a software-defined perimeter.

Microsegmentation

Microsegmentation refers to the division of a network into isolated segment. Traffic in and out of each segment is monitored an controlled to reduce lateral movement in the network. Microsegmentation can be achieved by implementing identity-based policies that don’t rely on network parameters or environment; instead it uses cryptographic identities and requires mutual authentication and authorization each time access is requested. This method only allows valid network traffic from verified devices and user accounts to access company resources.

Software-defined perimeter

A software-defined perimeter uses these main principles:

  • Least privilege: Once a user successfully authenticates and is granted access to a resource, they only have a network connection to that resource.
  • Continuous access reevaluation: A user’s access level is continuously reevaluated during a session and is changed if the identity of the user comes into question.
  • Attack surface reduction: Lateral movement is prevented with techniques like microsegmentation and the collection of contextual information ensures that any devices missing patches, that are compromised or that lack hardened configurations are unable to connect and cause damage to corporate infrastructure.

Using ZTNA

So what do microsegmentation and a software-defined perimeter do in practice? To put it in simpler terms:

  1. A user attempts to access company resources.
  2. The user’s credentials, device health and other criteria set by policies are verified.
  3. If identity and compliance is confirmed, a microtunnel is created between the device and the resource (not to the network as a whole).
  4. Identity and device status are continuously monitored, and the connection is revoked if either comes into question.

Key takeaways

  • Zero Trust assumes that no one with access to the network can be trusted, and thus data should be protected from lateral movement while access is only granted with least privilege.
  • ZTNA is built on the principles of Zero Trust.
  • ZTNA uses microsegmentation and a software-defined perimeter to isolate network resources from hosts inside the network and out of it.

Create secure connections to your company resources with Jamf.


G2 Summer 2023 Report

Month: July 2023

Author: July 18, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/g2-jamf-reviews-2023/

It brings us immense pride and appreciation to announce that we have received the highest accolades in the Summer 2023 Report, a publication by G2, the prominent tech marketplace and peer-to-peer review platform.

G2 scores products and vendors based on authenticated community reviews, aggregated online and social network data points, and algorithmic calculations of satisfaction and real-time market presence. You can find a detailed explanation of the report scoring methodology here.

Jamf continues to be ranked a leader with our mobile device management (MDM) solutions, Jamf Pro and Jamf Now, along with the authentication and identity management solution Jamf Connect. Endpoint management solution Jamf Protect continues to be a high performer, with Jamf School also making its debut on the MDM list.

Highlights from the G2 Summer 2023 Report

Jamf product solutions scored well in G2’s Summer 2023 report, with first-place rankings in 30 categories plus other high marks for Jamf Pro, Jamf Now, Jamf Protect, Jamf Connect and Jamf School.

Jamf Pro

Continues to reign as a Leader and #1 in 29 categories. Products in the Leader quadrant are rated highly by G2 users and have substantial Market Presence scores.

Highlights included:

Jamf Connect

Ranks in 16 categories overall while serving as a Leader in 3 grid reports.

Jamf Now

Ranked in 16 categories overall, and designated as a Leader in 2 grid reports.

Jamf Protect

Ranked in 9 categories while also making the cut as a Leader in 2 grid reports.

Jamf School

Making its first appearance in the G2 Summer 2023 report, ranking in 5 categories.

Don’t take our word for it…

Read what customers have to say about our solutions in G2’s profile of Jamf and how we’ve empowered them to not just meet their compliance goals but how Jamf solutions have and continue to “help organizations succeed with Apple” through holistic, comprehensive security of their Apple fleet – while maintaining user privacy.

You’ve heard from the rest, now it’s time to try the best!

Get started with the free trial and let Jamf help your organization succeed with Apple too.


How to improve employee productivity with BYOD

Month: July 2023

Author: July 18, 2023 by Haddayr Copley-Woods

Source: https://www.jamf.com/blog/how-to-improve-employee-productivity-with-byod/

How technology improves productivity with BYOD

Did you know that enabling BYOD devices for your employees boosts employee productivity? According to a recent Cybersecurity Insider study report by bitglass, employee productivity increased by a whopping 68% in companies that implemented BYOD programs.

Increase productivity with a BYOD program.

Technology in the workplace

The type of tech employers offer or enable, and how the tech is managed, can sometimes be the deciding factor for which organization a worker chooses as their employer. And it is certainly a vital factor in securing sensitive company data.

How do you handle remote employees or a hybrid workforce? What is a BYOD policy for remote workers?

Do BYOD programs really increase employee productivity?

In multiple studies spanning a decade, the answer is a resounding “yes.”

According to a recent data analysis report by Zippia, BYOD increases employee productivity by:

  • Enabling swift communication with colleagues
  • Allowing staff to access work files while away from their desks
  • Making workers more reachable, as most people are never far from their cell phones
  • Streamlining communication and tasks for those working on a familiar and comfortable device

Why employees use BYOD programs

According to the Zippia report, although many employees prefer separate devices, 96% of employees use their personal cell phones for work.

Here’s why:

  • 31% of employees find having everything in one place more convenient.
  • 28.1% of BYOD employees believe their own devices are of higher quality than the devices their employer provides.
  • 71% of companies cover a portion of workers’ BYOD service plans.

Organizations prefer BYOD

The average worker using their own device for work through a BYOD plan works two extra hours per day. That’s an astounding productivity metric. They also save money by not buying devices for employees and are better able to reach remote and hybrid employees.

With costs down and productivity up, it’s no wonder that nearly 70% of IT decision-makers approve of BYOD in the US.

Address any worries about BYOD

When organizations implement a BYOD program in order to boost employee productivity, they must address the legitimate concerns of employees and InfoSec. To create a strong BYOD program that everyone trusts, you will have to understand these concerns and mitigate them as you build your BYOD program.

For instance, organizations that take their data ownership seriously know that they are not only owners of that sensitive data but also stewards of that data. And as 88% of all data breaches are caused by an employee mistake, you’ll need to take the hardest security posture possible.

But does increased security mean increased surveillance? Address any employee concerns regarding privacy proactively. Workers don’t want their employers to be able to track them, see their browsing history and personal texts or keep tabs on where they are at all times.

Mitigate the security and privacy risks of BYOD

For the best plan that fosters organizational and employee trust, craft a BYOD program that focuses on threat prevention and remediation, privacy and the user experience.

Your BYOD program must have tight and multi-layered security with identity and access management, encrypted connections and powerful endpoint protection.

And for the safety of organizations and individuals alike, you need ironclad partitions between personal information and company data on employee-owned devices.

It only takes a single gap in your security armor for bad actors to get into your system. Ensure that absolutely everyone in your organization is accessing company resources safely, from trusted devices and with verified identification, in the same way.

Fortunately, there’s Jamf and Apple.

There is no hardware company more known for protecting user privacy than Apple. Using Jamf and Apple, you can take advantage of native iPhone security and privacy safeguards. And Jamf’s solutions depend on and work with this partitioning for the ultimate in privacy protections.

For instance, through partitioning, Apple has made it absolutely impossible for one side of a worker’s iPhone to see what the other side is doing. You can’t even copy and paste between work and personal applications.

Regardless of where they work or who owns the device they are using, you want a secure connection and strict security protocols for any device or person accessing company data and apps.

Using Apple Business Manager or Apple School Manager to manage Apple IDs, IT can automatically enroll every device into management. While BYOD employees have control over when or if they choose to enroll or unenroll, organizations can keep unmanaged devices from accessing sensitive data with the right software and configurations.

This way, employees remain secure in the knowledge that their increased productivity and better user experience won’t come at the cost of their privacy— and employers can take advantage of the boost to employee productivity that BYOD provides without additional risk to company networks and data.

Let Jamf help you build a strong BYOD program.


Teaching with technology is more than web access

Month: July 2023

Author: July 17, 2023 by Hannah Hamilton

Source: https://www.jamf.com/blog/transformative-learning-apple-technology/

Technology has always informed the way we learn in school: think radio, filmstrips, overhead projectors, VHS tapes, graphing calculators and beyond. Now with the internet and mobile devices, the avenues for learning have only multiplied. For better or for worse, students are no longer limited to what their teacher curates. They have access to the countless apps, webpages and other resources the internet has to offer.

Of course, this is true outside of school too — some of us can thank the typing classes we took in school for being able to quickly and efficiently, say, write a blog post. Similarly, current students will take the skills they learn from technology in the classroom and apply it to their adult lives.

The World Government Summit and McKinsey & Company released The Skills Revolution and the Future of Learning and Earning report in 2023.

It lists these three skills as the most important for the future:

  • Technological skills: advanced IT skills, programming and basic digital skills
  • Social and emotional skills: leadership and managing others, for example
  • Higher-level cognitive skills: creativity, complex information processing and critical thinking

So how do we use technology in a way that helps students develop these skills? While there’s almost certainly no single right way to approach this, this blog will dive into why we think Apple and Jamf are excellently suited for this pursuit.

Choosing classroom devices

Technology can help put students on the same playing field to develop the skills they need to succeed in the future.

When selecting appropriate tech for the classroom, there are a few things to consider:

  • How can we give all students the tools they need to learn despite their differences?
  • How can we encourage active collaboration?
  • How can we give students the freedom to explore online without putting them in danger?
  • How can we engage students and foster creative learning?

Addressing these factors will rely on device capabilities and compatibility as well as privacy and security. Devices need to be easy to use and accessible for a variety of learners, offer a number of collaborative and engaging apps and features, and have multiple ways to protect the privacy of the user and security of the device.

Why Apple is a good fit for schools

Apple started in education and maintains a unique position in the industry. Apple offers:

  • Exclusively built first-party operating systems and hardware
  • Industry-leading accessibility features
  • A privacy- and security-first approach

Apple exclusively develops both its hardware and software, so when you use Apple products, you know you’re getting the optimized experience. When equipping a classroom with all Apple devices, you eliminate both software and hardware cross-platform incompatibilities, making collaboration with peers more reliable. This enables teachers to go beyond browser-based applications and deliver a classroom experience that uses all the Apple platform has to offer.

When you give students the same devices, you’re giving them the same base-level experience while giving them the opportunity to tailor it to their specific needs and learning abilities. Apple offers a number of leading accessibility features built into the OS — not as an afterthought. Features like Guided Access, Speak Selection, VoiceOver, AssistiveTouch, Closed Captions and Eye-Tracking Support for iPad help students with cognitive, learning or physical disabilities by making the learning experience more accessible — with the goal of equalizing the playing field for a variety of learners. Students of various abilities have a better chance at developing the technological, social and emotional, and higher-level cognitive skills they need to succeed once they leave the classroom.

Related reading: Apple for students, teachers and parents with disabilities

Beyond the user interface, Apple builds its devices with security and privacy in mind — especially important in schools where young people’s safety and well-being are at stake. Students, teachers and parents can rest assured that their information is kept safe and their data isn’t being harvested.

How Jamf can help

Jamf expands on Apple’s capabilities by offering:

Jamf School

Jamf School is our Apple mobile device management (MDM) platform tailored for education. It helps with device deployment, classroom management, app provisioning and more. This helps IT keep track of and deploy devices while giving teachers a simple way to take control of their classrooms.

Jamf Teacher, Jamf Student and Jamf Parent

The Jamf Teacher app enables teachers to prepare and share lessons, manage student access, send messages, safelist apps, create an attention screen and start an ad-hoc classroom session. This makes it easier for teachers to meet students where they’re at in their learning journey and keep students focused.

The Jamf Student app encourages student participation- allowing them to send a message to their teacher or to “raise their hand” if they need help. Students still have the freedom to set up and manage their own iPads to make it their own within the constraints set by administrators.

Learning doesn’t stop once students go home. The Jamf Parent app gives parents the power to limit apps and device functionality on their students’ devices, helping them keep focused when at home.

Jamf Safe Internet

A part of developing technological, social and emotional, and higher-level cognitive skills is creative learning — allowing students to imaginatively and curiously explore. Instead of locking down devices to a minimum feature set, Jamf Safe Internet lets students safely explore the world wide web. By putting up guardrails, students can browse without accessing (whether deliberately or not) inappropriate or dangerous sites. Schools can block categories or specific sites that are inappropriate, unproductive or high bandwidth: keeping students safe and focused.

Related reading: Jamf Safe Internet protects everywhere that students learn

Key takeaways

  • Students need to develop technological, social and emotional, and higher-level cognitive skills for future success.
  • Creative learning and technology can help develop these skills.
  • Apple offers an unparalleled, unified, accessible experience in the classroom.
  • The Jamf platform enhances Apple in the classroom by simplifying workflows and protecting students.

Take advantage of technology in schools with Jamf School.


Jamf Account News

Month: July 2023

Author: July 14, 2023 by Christie Vick

Source: https://www.jamf.com/blog/jamf-account-apple-admins-updates/

Jamf Account is an online portal where you can find and manage features related to your account with Jamf. You can access Jamf products, manage your Jamf identity, enroll in training courses, participate in Beta/RC programs, and more!

Read on for highlights of how Jamf Account enables you to unlock the full potential of everything Jamf has to offer, accessed from one convenient place.

Jamf ID multi-factor authentication for Jamf Account

As of June 15, customers logging into Jamf Account with Jamf ID have a new option on their Profile > Security page to enable Multi-Factor Authentication (MFA) via TOTP codes (e.g. apps like Google Authenticator, Authy, etc.) Other factors such as SMS or email-based MFA are not supported. Currently this setting only applies to Jamf Account.

Admin SSO

Organization administrators can now configure their identity provider (IdP) once, in Jamf Account, with the configuration persisting across all Jamf products (including Jamf Account) that implement login via a customer’s chosen IdP.

Users who rarely access Jamf Account — e.g. only at renewal time — will no longer have to create or remember their Jamf ID. Enabling users to configure SSO credentials both increases efficiency and decreases the risk of forgotten passwords.

For users who do not have an identity provider or choose not to configure it with Jamf, the login experience will remain as Jamf ID or the application’s legacy authentication method. For more details read our Admin SSO blog.

Training

View available training courses, manage your upcoming enrollments and download certificates for completed enrollments in the “Training” area.

Training Passes are also available for purchase for either individuals or organizations. These can be applied during course enrollment.

Team member management

Manage all of your organization’s contacts and their access to Jamf in the “Your Organization” area.

The “Your Organization” section in Jamf Account allows you to:

  • Add new team members to the organization’s account. This action automatically sends contacts an invitation to create a Jamf ID if they don’t already have one.
  • Remove team members when they leave the organization.
  • Manage access to Jamf products.
  • See who changed what and when within Jamf Account via “Activity History.”
  • Assign roles (Decision Maker, Primary Technical, End User, Finance) and privileges:
    • An “Organizational Admin” can add, remove, or manage team members.
    • A “Viewer” has read-only access to “Your Organization” feature.
    • “None” does not have any access to the “Your Organization” feature.

Jamf Pro upgrades

Don’t forget that customers can upgrade standard Jamf Cloud instances directly from Jamf Account. If your Pro instance is not on the most recent version, you see an “Upgrade” button. You are given a choice to either upgrade immediately or schedule a specific date and time.

Check out these features and more by logging into your Jamf Account portal.


Microsoft macOS Conditional Access replaced in Jamf Pro 10.43

Month: July 2023

Author: July 14, 2023 by Katie John

Source: https://www.jamf.com/blog/microsoft-macos-conditional-access-replaced-in-jamf-pro-1043/

Jamf and Microsoft have had a long-standing partnership since the announcement of Conditional Access for macOS at JNUC in 2017. As Microsoft and Jamf continuously improve compliance technologies, Jamf will now begin utilizing Microsoft’s new Partner Compliance Management API with Device Compliance for macOS beginning with the Jamf Pro version 10.43 update.

Jamf will discontinue macOS Conditional Access support in a future release of Jamf Pro (Microsoft’s current estimated removal deadline is mid-2024) due to the migration away from Microsoft’s Partner Device Management legacy API. Jamf now offers an alternative solution called macOS Device Compliance using Microsoft’s new Partner Compliance Management API. Jamf Pro 10.48 offers a migration path for a smooth transition.

Jamf has made the strategic decision to build its Device Compliance integration to support the cloud, aligning with its cloud-first strategy. By leveraging cloud technologies, Jamf can deliver a more robust and scalable solution, providing on-demand monitoring, logging capabilities and faster delivery, support and maintenance of features. This reflects the direction we took in 2020 when we made iOS Compliance available in the cloud only. Continuing this cloud-first vision, we hope to offer customers a more intuitive workflow and an experience that is consistent across platforms. Embracing the cloud allows organizations to streamline device compliance management, enhance security and stay ahead of evolving compliance requirements in today’s digital landscape. While on-premise support is not currently available, Jamf remains committed to meeting the needs of customers and continues to find tailored security solutions for Apple environments of all sizes.

Try Jamf Today!


NIST BYOD guidelines

Month: July 2023

Author: July 12, 2023 by Hannah Hamilton

Source: https://www.jamf.com/blog/byod-nist-guidelines/

Interested in implementing a bring your own device (BYOD) program in your organization? We aren’t surprised — you’d be joining the growing number of companies with a BYOD policy of some kind. BYOD has proven that it’s not a trend for trendiness sake: there are a number of reasons (asreported by Zippia) why these programs make sense:

  • 75% of employees are already using their personal devices for work purposes
  • Productivity increases by 34% once you add smartphones as a work device
  • BYOD can save companies money — about $250 per employee with a BYOD plus stipend policy

Despite these benefits, there are a number of important considerations organizations have to grapple with when starting a BYOD program, such as:

  • Protecting corporate data being accessed on non-corporate devices
  • Balancing user privacy and data security
  • Overcoming employee fear of surveillance and mistrust when their personal devices are managed
  • Supporting a variety of device types

In other words, users want the convenience and familiarity of their own personal devices, without feeling like their IT department is watching their every move. For organizations, this makes securing their data more challenging — after all, if you don’t know what users are doing on their device, how do you know your data is in the proper hands?

Thankfully, there’s no need to surveil your employees for the sake of security, nor is there a lack of guidance on how to overcome the challenges BYOD programs offer. Let’s get into it.

NIST guidelines for BYOD security

The U.S. National Institute of Standards and Technology (NIST), has historically provided a cybersecurity framework used by countless organizations to develop their cybersecurity policies. The framework lays out cybersecurity best practices, standards, guidelines and other resources. The second draft of NIST Special Publication 1800-22B is a collaboration between NIST and industry leaders dives into BYOD security, discussing architecture, security and privacy analysis, providing examples and more.

This publication identifies six security and privacy goals organizations need to aim for when implementing a BYOD program:

  • Separate organization and personal information
  • Encrypt data in transit
  • Identify vulnerable applications
  • Prevent or detect malware
  • Trusted device access
  • Restrict information collection

Let’s take a look at each of these and talk about how Jamf and Apple can help your organization achieve these goals while maintaining a high standard of compliance and user privacy.

1. Separate organization and personal information

BYOD programs can blur the lines between personal and work devices. Organizational data is at risk as it travels outside internal networks and systems, while personal data is at risk if organizations capture data not needed for work purposes from employee devices. By restricting the flow of data between unmanaged personal apps and managed work apps, sensitive data can be kept in the right hands.

Jamf solutions

Employees gain access to corporate resources by enrolling into Jamf Pro via user enrollment. When users log in to their device with their managed Apple ID, this launches the service discovery feature, which then directs the user to the Jamf Pro enrollment portal.

With user enrollment on iPhone and iPad, all data on the device is separated into work and personal accounts — only the work part of their device has management and data collection. This means the personal data stays personal while company data is restricted to only approved apps and secure communication channels. IT can’t see any personal information, usage data or logs, take over management of a personal app, access device location or remove any personal data.

Related reading: Account-driven User Enrollment + Service Discovery

2. Encrypt data in transit

Since users are using BYOD devices outside the workplace, these devices often connect to unsecured networks, putting corporate data at risk. Organizations can mitigate this risk by requiring VPN or similar connections that encrypt all data before it’s transmitted off the device.

Jamf solutions

Jamf Connect and Jamf Protect combine to provide ZTNA. With dynamically created microtunnels unique to each app, ZTNA secures data in transit by segmenting traffic after user identity and device health have been verified. Unlike traditional VPN, ZTNA doesn’t give devices holistic access to company networks once the user logs in once. Since this is on an app-by-app basis, this also means only work apps go through company networks — personal traffic is routed directly to the internet.

Related reading: No trust assumed: strengthen cybersecurity with ZTNA

3. Identify vulnerable applications

Employees have free rein to install the apps they want on their personal devices, even apps that have security vulnerabilities. Organizations should separate work data and personal data on the device so compromised personal apps can’t affect work apps. And to limit vulnerabilities, work apps should always be patched to the latest version. This combination of up-to-date work apps and the separation of work and personal data insulates company data from vulnerabilities on the user’s device.

Jamf solutions

As mentioned before, Jamf Pro cannot see or delete personal apps on an employee’s device. However, it can ensure work apps are updated and only connected via secure network. If a vulnerability is detected within a work app, Jamf can suspend access until the app is patched or removed.

Related reading: A holistic approach to security: app management

4. Prevent or detect malware

On personally-owned devices, employees can download apps from third-party stores, increasing the chance they download malware. Organizations can deploy malware protection within the work profile or managed applications to identify or remediate malicious software or code on the device. Companies can also leverage an OS version with built-in security features that help prevent or detect the installation of malware onto the device.

Jamf solutions

Apple’s security and privacy frameworks offer inherent protections on your devices. For example, since iOS apps are sandboxed, the likelihood of a vulnerable app gaining unauthorized access to other data on your device is significantly reduced. Jamf products build on this native security and give organizations the tools they need to implement security measures. The Jamf Trust app can be installed on BYOD devices, notifying users when their device has an out-of-date operating system that may not have the latest vulnerabilities patched.

Related reading: Apple Device Security for Beginners

5. Trusted device access

With the proliferation of remote work, BYOD devices are connecting to corporate resources beyond the network perimeter from unknown networks and locations. Organizations should have a method to strictly identify and authenticate devices and users that enroll into MDM. After a device identity is confirmed, a user can establish their identity with their credentials and MFA, ensuring only verified devices and users are connecting to company resources.

Jamf solutions

Beyond Jamf’s robust support of User Enrollment, Jamf leverages Apple’s Declarative Device Management feature to ensure the integrity of each enrollment and provide real-time insights around OS and security patch status. When using ZTNA, Jamf Connect verifies user identity while Jamf Protect ensures the device is in good health, keeping data in good hands.

Related reading: Declarative Device Management

6. Restrict information collection

Depending on how BYOD devices are enrolled, your MDM solution may collect beyond the necessary data about application inventory, device information and location information — including physical and IP addresses, geographic coordinates, SSID, serial number and phone number. This information can reveal private information about an employee; MDM solutions should use privacy-preserving BYOD frameworks that prioritize user privacy, instead of simply turning off features or ignoring certain data collection.

Jamf solutions

We talked about how BYOD devices enrolled in Jamf have distinct work and personal containers, and that data stays in each container. User privacy is paramount at Jamf: personal user data is never collected. Again, corporate IT is incapable of:

  • Seeing personal information, usage data or logs
  • Accessing inventory of personal apps
  • Removing any personal data
  • Taking over management of a personal app
  • Requiring a complex passcode or password
  • Accessing device location or unique device identifies
  • Remotely wiping the entire device
  • Managing Activation Lock
  • Accessing roaming status
  • Enabling Lost Mode

Related reading: Misconceptions about mobile BYOD

Key takeaways

  • Employees already use their personal devices for work; a good BYOD policy can help your security posture
  • BYOD programs require a balance of security and user privacy to be successful
  • A well-implemented BYOD program requires employee trust, which requires user privacy protection
  • With Jamf, IT maintains full control over work data without access to any of the user’s personal information

Secure. Private. Discover Jamf BYOD. Find out more in Mobile BYOD with Jamf and Apple.